Email Security Analysis of hzcu.org

Complete verification of hzcu.org's SPF, DKIM, DMARC, and MTA-STS records. Find out if this domain is protected against email spoofing.

Last updated: April 15, 2026

90A
This domain is protected against spoofing

SPF

OK
v=spf1 mx include:spf.digitalinsight.com include:us._netblocks.mimecast.com include:spfhost.messageprovider.com include:spf.cashedge.com include:amazonses.com include:spf-a.customercenter.net include:spf-b.customercenter.net ip4:216.229.177.178 ip4:207.88.75.34 ip4:207.88.75.35 ip4:63.117.120.96/27 ip4:63.38.149.224/27 ip4:208.252.57.192/27 ip4:207.88.75.44 ip4:208.81.32.0/22 ip4:198.185.62.0/23 ip4:12.106.86.0/24 ip4:64.124.120.0/24 ip4:148.59.151.0/24 ip4:208.63.79.0/24 ip4:209.208.209.0/24 ip4:208.235.248.20 ip4:50.58.9.15 ip4:69.72.45.234 ip4:40.123.53.218 ip4:198.21.6.113 ip4:168.245.40.179 -all

DKIM

OK
Selectors: selector1, selector2, smtp, s1, s2

DMARC

OK
v=DMARC1; p=reject; aspf=r; adkim=r; rua=mailto:dmarcrua@hzcu.org,mailto:reports@dmarcexplorer.com; ruf=mailto:dmarcruf@hzcu.org; fo=1; pct=100; ri=86400;

MX

OK
us-smtp-inbound-2.mimecast.com, us-smtp-inbound-1.mimecast.com

MTA-STS

Missing

No record found

Read the guide

Recommendations

  1. 1Add MTA-STS to enforce TLS encryption for incoming emails

    Without MTA-STS, an attacker performing a man-in-the-middle attack can downgrade the connection between mail servers to plaintext, intercepting emails in transit. MTA-STS tells sending servers to only deliver via TLS with a valid certificate, preventing downgrade attacks.

Run a live analysis

The results above are updated daily. For an instant check of hzcu.org, run a live analysis.

Analyze hzcu.org live

Guides to understand these results